Windows Server 2008

  1. This Active Directory Domain Services installation requires domain configuration changes, but whether these changes have ...
  2. This Active Directory Domain Services installation requires domain configuration changes. However, configuration changes ...
  3. This Active Directory Domain Services installation requires domain configuration changes. Run the adprep /domainprep command ...
  4. This Active Directory Lightweight Directory Services installation requires domain configuration changes, but whether these ...
  5. This Active Directory Lightweight Directory Services installation requires domain configuration changes. However, configuration ...
  6. This Active Directory Lightweight Directory Services installation requires domain configuration changes. Run the adprep /domainprep ...
  7. This Active Directory Lightweight Directory Services instance cannot be promoted because of a space in the NetBIOS computer ...
  8. This Active Directory Rights Management Services (AD RMS) cluster cannot perform an operation on one of the AD RMS databases. ...
  9. This Active Directory Rights Management Services (AD RMS) cluster cannot write data to one of the AD RMS databases. Ensure ...
  10. This ActiveX control cannot be deleted because an error occurred. Make sure that you are logged on to the computer as an ...
  11. This ActiveX control cannot be deleted because it is still in use. Close all Internet Explorer windows, restart Internet ...
  12. This ActiveX control was previously added to your computer when you installed another program, or when Windows was installed. ...
  13. This AD RMS cluster has been decommissioned. You must modify the access control list of the Decommissioning Web service page ...
  14. This adapter is part of the Network Bridge. To remove this adapter from the Network Bridge, or to modify bridge settings, ...
  15. This address range was generated from the IP address of your network adapter. You can change the address range by defining ...
  16. This advertised application will not be installed because it might be unsafe. Contact your administrator to change the installation ...
  17. This affects handwriting recognition when you write the character by itself, such as when you make corrections in Table PC ...
  18. This agent monitors additions to IE, such as new toolbars, browser helper objects, and ActiveX controls. These add-ons can ...
  19. This agent monitors end user and security related configuration changes made to Internet Explorer, including the default ...
  20. This agent monitors services and drivers acting as part of Windows, often running with high security privileges. It ensures ...
  21. This agent monitors the various mechanisms that software can use to automatically start when you log on to Windows. Programs ...
  22. This agent monitors the various ways which permit a program, script, or executable to be started independent of an application. ...
  23. This agent scans software just before it runs. You are alerted if the software has a high potential for harming your computer. ...
  24. This allows the Windows Firewall to be remotely managed using the Windows Firewall with Advanced Security MMC snap-in or ...
  25. This analysis is a comparison of the selected server's configuration to the selected security policy at the given date and ...
  26. This answer file was created with another Windows image. Click Yes to open the Windows image originally associated with the ...
  27. This application caused a delay during standby: File Name : %3 Friendly Name : %5 Version : %7 Total Time : %8ms Degradation ...
  28. This application caused a delay in the system shutdown process: File Name : %3 Friendly Name : %5 Version : %7 Total Time ...
  29. This application does not have permission to load a Connection Manager profile. To start the profile you can click Start, ...
  30. This application file refers to components that were originally imported into the application. These components must be manually ...
  31. This application file version is not supported. The catalog into which you are attempting to install this application file ...
  32. This application is requesting Windows Media Center to release the tuner. If you select Yes any current or scheduled recordings ...
  33. This application is trying to replace a file on your computer that is protected. Contact the application provider for assistance. ...
  34. This application may not work correctly because your TV signal is not configured. To set up your TV signal, close this application, ...
  35. This application took longer than usual to start up, resulting in a performance degradation in the system startup process: ...
  36. This application was set to run forever when the listener was enabled. You may wish to go to the advanced page and modify ...
  37. This association relates a CIM_Configuration object to one or more managed system elements. The CIM_Configuration object ...
  38. This association relates a MSI Check with any locational information it requires. The location is in the form of a file and/or ...
  39. This association relates an MSI action with any locational information it requires. This location is in the form of a file ...
  40. This auditing entry is inherited from the parent object. Make changes here to create a new auditing entry that overrides ...
  41. This backup will include only logon credentials that you've asked Windows to remember. It will not include any credentials ...
  42. This Briefcase database is corrupt. The files in the Briefcase are okay, but they are no longer in a sync relationship with ...
  43. This business rule application group does not have a script loaded. Please load a script that defines the members of this ...
  44. This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities ...
  45. This call requires the parameters to specify one extent per disk. A single disk cannot contribute to multiple members or ...
  46. This calling card is missing some required information. To use this card, click Edit to provide more information, or select ...
  47. This certificate already exists in the certificate store you selected. Do you want to overwrite the existing certificate? ...
  48. This certificate cannot be renewed because it does not contain enough information to generate a renewal request. Please request ...
  49. This certificate cannot be used to verify the authenticity of downloaded software because it does not have the appropriate ...
  50. This certificate has been validated on your computer. The remote computer was not used to verify this certificate. To ensure ...
  51. This certificate is managed by the Terminal Server and you cannot view the certificate details. It is recommended that you ...
  52. This certificate is not valid because one of the certification authorities in the certification path does not appear to be ...
  53. This certificate template uses CSPs that do not support the minimum key length you chose. Requests will use any CSP available ...
  54. This certificate trust list cannot be verified. The certificate that countersigned this CTL is not available for verification. ...
  55. This certificate trust list is not valid. The countersignature cannot be verified and the CTL may have been tampered with. ...
  56. This certificate uses the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols to communicate securely ...
  57. This certificate validates to a root certificate that appears to be trusted by the remote computer. To ensure this certificate ...
  58. This change might cause any digital media content that is playing or paused to restart. Do you want to continue with the ...
  59. This change will require administrative clients to update the name used to connect to this cluster. Are you sure you wish ...
  60. This change will require clients to update the name used to connect to this service or application. Are you sure you wish ...
  61. This channel includes content for display by the Channel Screen Saver. Would you like to replace your current screen saver ...
  62. This channel is password-protected. You will not be able to synchronize this channel without a username and password. If ...
  63. This channel requires a user name and password before you can download its content. You should have received this information ...
  64. This checkbox only applies when you are connected to a local network and a dial-up network simultaneously. When checked, ...
  65. This class contains the .INI information that the application needs to set in an .INI file. The .INI file information is ...
  66. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  67. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  68. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  69. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  70. This class extends LogicalElement to abstract the concept of an element that is enabled and disabled, such as a LogicalDevice ...
  71. This class provides access to ID table records. The ID table has a record for each file and folder known to the DFS Replication ...
  72. This class provides details about the files and folders that were moved to the Conflict and Deleted folder due to conflicting ...
  73. This class provides statistical and operational information for active sync sessions between the local replication group ...
  74. This class provides statistical and operational information for each incoming and outgoing connection of the local replication ...
  75. This class provides statistical and operational information for each replication group member hosted on the local computer. ...